<p>Chris Valasek draws from his research and headline-making exposure of serious automotive security flaws as he shares real-world solutions for protecting consumers and companies against cyber-attacks.</p>

<p>Regarded for his work in the automotive security arena, Chris is a Principal Autonomous Vehicle Security Architect at Cruise Automation and also served as a security lead at Uber’s Advanced Technology Center and chairman of SummerCon, America’s longest running hacker conference.</p>

<p>Best known for engineering the remote compromise of a 2014 Jeep Cherokee with his research partner, Dr. Charlie Miller, he has been praised for exposing serious security flaws in automobiles. Chris is one of the first researchers to discuss automotive security issues in detail – his release of code, data and tools that allowed vehicles to be physically accessed and controlled through the vehicle’s CAN bus garnered worldwide media attention.</p>

<p>Highly sought for his sobering insights on security problems in various technologies and devices that can lead to compromises from the outside world, Chris shares urgent solutions for protecting the public from imminent cyber-threats. His thoughts on the world of cybersecurity in general will change your entire view of potential vulnerabilities faced by not only the auto industry, but our increasingly digital, wireless and Internet of Things way of life and business.</p>

Category
First Name
Chris
Last Name
Valasek
Twitter
nudehaberdasher
Siebel ID
1-16957X
Moniker

Principal Autonomous Vehicle Security Architect & Renowned 'White Hat' Hacker

Speech Topics

<ul><li><strong>Internet of Things vs. The Security of Things</strong></li><li>The headlines talk about your light bulbs and toothbrushes getting hacked. What the heck is going on, this is not the future we were promised. Luckily, you can hear from a couple of experts who have hacked everything from computers, to phones, to laptop batteries, and even a car once. Incorporating stories from their research, they’ll talk about what makes IoT devices so different from normal computers and why they are uniquely vulnerable. However, it is not all doom and gloom. They will also describe why we shouldn’t necessarily be too scared about IoT security and why we can safely keep iterating and advancing technology moving forward without fear of a cyber apocalypse.</li><li><strong>Hacking For Good</strong></li><li>Since the days of movies like War Games and Hackers, computer hackers have been in the social conscience but today hackers are even more feared and perhaps misunderstood. Meet a couple of the worlds most feared computer hackers. However, they aren’t feared by people who think they might steal their banking information. No, these are good guy hackers who point out flaws in the software and hardware we all use every day. They are feared by leading companies like Apple, Google, and even companies like Fiat Chrysler. They’ll explain why all the computers and devices we use are inherently vulnerable to attack and what we can do to protect ourselves. Utilizing a casual style and relying on stories of when they hacked cars, computers, or the time they could hack your phone just by getting near it, you’ll learn why these guys spend time looking for vulnerabilities and writing exploits and how it ultimately helps to protect us all.</li></ul>

Hide Fee
Off
Exclusive
Off
Environment
Headline (Deprecated)
A renowned “white hat” hacker, this cybersecurity researcher helps you develop a greater understanding of cyber vulnerabilities and emerging threats—and solutions for protecting business assets and society.
Image Alt Tag
Chris Valasek, Business Speaker, Keppler Speakers Bureau
Marketing Toolkit
Valasek C-Bio.doc
Valasek C-Intro.doc
Valasek C-Photo (ASAE-2016).JPG
Valasek C-Photo (HEADSHOT 2_17).jpg
Valasek C-Topics.doc
Ignore Keppler Lit?
No